You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: azure-local/concepts/security-features.md
+14-2Lines changed: 14 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ author: alkohli
5
5
ms.author: alkohli
6
6
ms.topic: conceptual
7
7
ms.service: azure-local
8
-
ms.date: 02/14/2025
8
+
ms.date: 02/26/2025
9
9
---
10
10
11
11
# Security features for Azure Local
@@ -158,10 +158,22 @@ For more information, see [Manage syslog forwarding](../manage/manage-syslog-for
158
158
159
159
Azure Local comes with Microsoft Defender Antivirus enabled and configured by default. We strongly recommend that you use Microsoft Defender Antivirus with your Azure Local instances. Microsoft Defender Antivirus provides real-time protection, cloud-delivered protection, and automatic sample submission.
160
160
161
-
Although we recommend using Microsoft Defender Antivirus for Azure Local, if you prefer third-party antivirus and security software, we advise selecting one that your Independent Software Vendor (ISV) has validated for Azure Local to minimize potential functionality issues.
161
+
Although we recommend using Microsoft Defender Antivirus for Azure Local, if you prefer third-party antivirus and security software, **we advise selecting one that your Independent Software Vendor (ISV) has validated for Azure Local** to minimize potential functionality issues.
162
162
163
163
For more information, see [Microsoft Defender Antivirus compatibility with other security products](/defender-endpoint/microsoft-defender-antivirus-compatibility).
164
164
165
+
In the rare instance that you experience any functionality issues with Azure Local using a third-party antivirus software, you can exclude the following paths:
166
+
167
+
- C:\Agents\\*
168
+
- C:\CloudContent\\*
169
+
- C:\CloudDeployment\\*
170
+
- C:\ClusterStorage\\*
171
+
- C:\EceStore\\*
172
+
- C:\MASLogs\\*
173
+
- C:\NugetStore\\*
174
+
- C:\deploymentpackage\\*
175
+
- C:\ProgramData\GuestConfig\extension_logs\\*
176
+
165
177
> [!NOTE]
166
178
> If you remove the Microsoft Defender Antivirus feature, leave the settings associated with the feature from the security baseline as-is. You don't need to remove these settings.
Copy file name to clipboardExpand all lines: azure-local/deploy/single-server.md
+17-10Lines changed: 17 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ ms.author: robess
6
6
ms.topic: how-to
7
7
ms.reviewer: kimlam
8
8
ms.lastreviewed: 01/17/2023
9
-
ms.date: 01/31/2024
9
+
ms.date: 02/27/2025
10
10
---
11
11
12
12
# Deploy Azure Stack HCI on a single server
@@ -23,9 +23,9 @@ Currently you can't use Windows Admin Center to deploy Azure Stack HCI on a sing
23
23
24
24
## Prerequisites
25
25
26
-
- A server from the [Azure Stack HCI Catalog](https://hcicatalog.azurewebsites.net/#/catalog)that's certified for use as a single-node cluster and configured with all NVMe or all SSD drives.
26
+
- A server from the [Azure Stack HCI Catalog](https://hcicatalog.azurewebsites.net/#/catalog) certified for use as a single-node cluster and configured with all NVMe or all SSD drives.
27
27
- For network, hardware and other requirements, see [Azure Stack HCI network and domain requirements](../deploy/operating-system.md#determine-hardware-and-network-requirements).
28
-
- Optionally, [install Windows Admin Center](/windows-server/manage/windows-admin-center/deploy/install) to register and manage the server once it has been deployed.
28
+
- Optionally, [install Windows Admin Center](/windows-server/manage/windows-admin-center/deploy/install) to register and manage the server after it's deployed.
29
29
30
30
## Deploy on a single server
31
31
@@ -38,8 +38,10 @@ Here are the steps to install the Azure Stack HCI OS on a single server, create
38
38
```
39
39
40
40
1. Install the Azure Stack HCI OS on your server. For more information, see [Deploy the Azure Stack HCI OS](../deploy/operating-system.md#manual-deployment) onto your server.
41
+
41
42
1. Configure the server utilizing the [Server Configuration Tool](/windows-server/administration/server-core/server-core-sconfig) (SConfig).
42
-
1. Install the required roles and features using the following command, then reboot before continuing.
43
+
44
+
1. Install the required roles and features using the following command, then reboot before you continue.
@@ -60,10 +62,11 @@ Here are the steps to install the Azure Stack HCI OS on a single server, create
60
62
```
61
63
62
64
> [!NOTE]
63
-
> - The cluster name should not exceed 15 characters.
64
-
> - The `New-Cluster` command will also require the `StaticAddress` parameter if the node is not using DHCP for its IP address assignment. This parameter should be supplied with a new, available IP address on the node's subnet.
65
+
> - The cluster name shouldn't exceed 15 characters.
66
+
> - The `New-Cluster` command requires the `StaticAddress` parameter if the node isn't using DHCP for its IP address assignment. This parameter should be supplied with a new, available IP address on the node's subnet.
65
67
66
68
1. Use [PowerShell](../deploy/register-with-azure.md?tab=power-shell#register-a-cluster) or [Windows Admin Center](../deploy/register-with-azure.md?tab=windows-admin-center#register-a-cluster) to register the cluster.
@@ -76,16 +79,20 @@ For solution updates (such as driver and firmware updates), see your solution ve
76
79
77
80
## Change a single-node to a multi-node cluster (optional)
78
81
79
-
You can add servers to your single-node cluster, also known as scaling out, though there are some manual steps you must take to properly configure Storage Spaces Direct fault domains (`FaultDomainAwarenessDefault`) in the process. These steps aren't present when adding servers to clusters with two or more servers.
82
+
You can add servers to your single-node cluster, also known as scaling out, though there are some manual steps you must take to properly configure Storage Spaces Direct fault domains (`FaultDomainAwarenessDefault`) in the process. These steps aren't present when you add servers to clusters with two or more servers.
80
83
81
84
1. Validate the cluster by specifying the existing server and the new server: [Validate an Azure Stack HCI cluster - Azure Stack HCI | Microsoft Docs](../deploy/validate.md).
85
+
82
86
2. If cluster validation was successful, add the new server to the cluster: [Add or remove servers for an Azure Stack HCI cluster - Azure Stack HCI | Microsoft Docs](../manage/add-cluster.md).
87
+
83
88
3. Once the server is added, change the cluster's fault domain awareness from PhysicalDisk to ScaleScaleUnit: [Inline fault domain changes](../manage/single-node-scale-out.md#inline-fault-domain-changes).
89
+
84
90
4. Optionally, if more resiliency is needed, adjust the volume resiliency type from a 2-way mirror to a Nested 2-way mirror: [Single-server to two-node cluster](../manage/single-node-scale-out.md#single-server-to-two-node-cluster).
91
+
85
92
5.[Set up a cluster witness](../manage/witness.md).
Copy file name to clipboardExpand all lines: azure-local/manage/create-arc-virtual-machines.md
+28-2Lines changed: 28 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -136,7 +136,33 @@ Here we create a VM that uses specific memory and processor counts on a specifie
136
136
| **storage-path-id** |The associated storage path where the VM configuration and the data are saved. |
137
137
| **proxy-configuration** |Use this optional parameter to configure a proxy server for your VM. For more information, see [Create a VM with proxy configured](#create-a-vm-with-proxy-configured). |
138
138
139
-
1. Run the following command to create a VM.
139
+
1. Run the following commands to create the applicable VM.
140
+
141
+
**To create a Trusted launch Arc VM:**
142
+
143
+
1. Specify additional flags to enable secure boot, enable virtual TPM, and choose security type. Note, when you specify security type as Trusted launch, you must enable secure boot and vTPM, otherwise Trusted launch VM creation will fail.
@@ -247,7 +273,7 @@ Follow these steps in Azure portal for your Azure Local.
247
273
248
274
**The Virtual machine kind** is automatically set to **Azure Local**.
249
275
250
-
1.**Security type** - For the security of your VM, select **Standard** or **Trusted Launch virtual machines**. For more information on what are Trusted Launch Arc virtual machines, see [What is Trusted Launch for Azure Arc Virtual Machines?](./trusted-launch-vm-overview.md).
276
+
1.**Security type** - For the security of your VM, select **Standard** or **Trusted launch virtual machines**. For more information on what are Trusted launch Arc virtual machines, see [What is Trusted launch for Azure Arc Virtual Machines?](./trusted-launch-vm-overview.md).
251
277
252
278
1.**Storage path** - Select the storage path for your VM image. Select **Choose automatically** to have a storage path with high availability automatically selected. Select **Choose manually** to specify a storage path to store VM images and configuration files on your Azure Local. In this case, ensure that the selected storage path has sufficient storage space.
This article uses an example to illustrate the automatic transfer of virtual TPM (vTPM) state in the case of Trusted launch Arc VMs on Azure Local, even as the VM migrates or fails over to another machine in the system. This operation allows the applications that use the vTPM to function normally during VM migration or fail over.
16
+
17
+
18
+
## Example
19
+
20
+
This example shows a Trusted launch Arc VM running Windows 11 guest with BitLocker encryption enabled. Here are the steps to run this example:
21
+
22
+
1. Create a Trusted launch Arc VM running a supported Windows 11 guest operating system (OS).
23
+
24
+
1. Enable BitLocker encryption for the OS volume on the Win 11 guest. Sign on to the Windows 11 guest and enable BitLocker encryption for the OS volume:
25
+
26
+
1. In the search box on the task bar, type "Manage BitLocker," and then select it from the list of results.
27
+
28
+
1. Select **Turn on BitLocker** and then follow the instructions to encrypt the OS volume (C:). BitLocker uses vTPM as a key protector for the OS volume.
29
+
30
+
1. Confirm the owner node of the VM.
31
+
32
+
```powershell
33
+
Get-ClusterGroup <VM name>
34
+
```
35
+
36
+
1. Migrate the VM to another machine in the system. Run the following PowerShell command from the machine that the VM is on.
1. Confirm that the owner node of the VM is the specified destination node.
43
+
44
+
```powershell
45
+
Get-ClusterGroup <VM name>
46
+
```
47
+
48
+
1. After VM migration completes, verify if the VM is available and BitLocker is enabled.
49
+
50
+
1. Verify that you can sign on to the Windows 11 guest in the VM, and if BitLocker encryption for the OS volume remains enabled. If true, this confirms that the vTPM state was preserved during VM migration.
51
+
52
+
> [!NOTE]
53
+
> If vTPM state wasn't preserved during VM migration, VM startup would result in BitLocker recovery during guest boot up. You would be prompted for the BitLocker recovery password when you attempted to sign on to the Windows 11 guest. This situation occurs because the boot measurement (stored in the vTPM) of the migrated VM on the destination node is different from that of the original VM.
54
+
55
+
1. Force the VM to fail over to another machine in the system.
56
+
57
+
1. Confirm the owner node of the VM using the following command.
58
+
59
+
```powershell
60
+
Get-ClusterGroup <VM name>
61
+
```
62
+
63
+
1. Use Failover Cluster Manager to stop the cluster service on the owner node as follows: Select the owner node as displayed in Failover Cluster Manager. On the **Actions** right pane, select **More Actions** and then select **Stop Cluster Service**.
64
+
65
+
1. Stopping the cluster service on the owner node causes the VM to be automatically migrated to another available machine in the system. Restart the cluster service afterwards.
66
+
67
+
1. After failover completes, verify if the VM is available and BitLocker is enabled after failover.
68
+
69
+
1. Confirm that the owner node of the VM is the specified destination node.
70
+
71
+
```powershell
72
+
Get-ClusterGroup <VM name>
73
+
```
74
+
75
+
1. After VM failover completes, verify if the VM is available and BitLocker is enabled.
76
+
77
+
1. Verify that you can sign on to the Windows 11 guest in the VM, and if BitLocker encryption for the OS volume remains enabled. If true, the vTPM state was preserved during VM failover.
78
+
79
+
> [!NOTE]
80
+
> If vTPM state wasn't preserved during VM migration, VM startup would result in BitLocker recovery during guest boot up. You would be prompted for the BitLocker recovery password when you attempted to sign on to the Windows 11 guest. This situation occurs because the boot measurement (stored in the vTPM) of the migrated VM on the destination node is different from that of the original VM.
81
+
82
+
83
+
## Next steps
84
+
85
+
- [Manage Trusted launch Arc VM guest state protection key](trusted-launch-vm-import-key.md).
0 commit comments